Friday, 9 February 2018

How Google Search Works..?


Now a days Internet has become a comman term among people and in it Google is one of the most widely used searched engine. So now some people What really a Search Engine is..?  So Search Engine is basically a program or tools by which we are able to search anything on the Internet. There are many types of search engines available like... Google search, Yahoo Search, Bing, Duck Duck Go etc.. in them the Google is mostly used.
           So now the question arises How Does a Google Search  Works..? When you search anything on Google let us suppose you typed 'techtalksgroup'.
       Basically it works in many stages, the first stage includes of   
  • Crawling . Crawling is a method of fetching a web page that contains the keyword that you types to search. For example i told you that if i search techtalksgroup on google it will find everywhere on the web where the word techtalksgroup is located and it will collect it all. Now the next stage is of managing the web page in particular order.
  • Indexing.  Now under Indexing stage it will arrange the pages collected in a sequence like  the most searched page will be indexed first and , the pages which exactly matches with the keyword will indexed first etc.. Now the third stage is of just serving the page what you typed.
  • Serving.  Now serving comprises of showing the pages and links infront of you what you have searched for.. So there is basically an AI based algorithm know as Page rank. PageRank is the measure of the importance of a page based on the incoming links from other pages. In simple terms, each link to a page on your site from another site adds to your site's PageRank. 
thats it guys...
---------------------------------------------
I use mCent Browser to surf the net and earn points for free recharge. Install from Google Play: https://browser.mcent.com/r/IcGhMDOtSMib5Deybu2xYQ

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Tuesday, 6 February 2018

Do you really rid of your 'Activities' while just clearing your Internet history and Cookies.?

Now a days most of the people use Internet and perform some critical activities thinking of that after deleting their history or clearing their Browsing  data they will not get caught.
   

       But that's not True. Some people use to say that After i am dead please delete my Browsers history. Sounds funny .. But yes it is funny . Most of the people are unaware that after deleting their browsers history and cookies their data is still traveling on the Internet . But how..? 
     Let me give you an example . Suppose you create your Profile on Facebook or search something on Google after creating profile you delete you account and after searching something on Google just delete your Internet history and cache and cookies but the data is only deleted from your side ..!!
          Yes that's true .. the data you deleted is just deleted from your side and your data which is kept safely on  the Internet used by some Government, marketing and advertisements company for their profits. Yes they sell your data . It is still illegal in some countries like in Europe but in US after during 2017 its legal. And also the ISP i.e internet service providers also has the record of what you are surfing . but it can easily tricked. if you use some methods to remain anonymous.

 So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

    

Wednesday, 31 January 2018

What is SEO ( Search Engine Optimization) ....?


Now a days using the internet is comman now a days. If you want to search for specific location or  thing instead of asking to someone you would prefer to search it on the Internet means on some websites . So what role does SEO i.e  Search Engine Optimization  plays for a websites ...?
         So, SEO stands for SEARCH ENGINE OPTIMIZATION . SEO is all about optimizing your website for search engines.SEO is a techniques which makes your websites friendly to a search engines, means if user search something on which your website is related your website should come on top 5-10 results. So before making your website search engine friendly you should know How does a Search engine works..?

How Search Engine Works..?

 A Search Engine has to perform several types of activities for selecting a write website for his top results :-
  • Crawling :-  Crawling is a process of fetching all the linked webpages to a website. This process is performed by a software named Crawler or Spider and in case of Google it's Googlebot
  •  Indexing  :- Process of creating index for all the fetched web pages and keeping them into a giant database from where it can later be retrieved. Essentially, the process of indexing is identifying the words and expressions that best describe the page and assigning the page to particular keywords. 
  • Processing :-  When a search request comes, the search engine processes it, i.e. it compares the search string in the search request with the indexed pages in the database.
  • Calculating Relevancy :-  It is likely that more than one page contains the search string, so the search engine starts calculating the relevancy of each of the pages in its index to the search string.
  • Retrieving Results :-  The last step in search engine activities is retrieving the best matched results. Basically, it is  nothing more than simply displaying them in the browser.
 So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Monday, 29 January 2018

What is Oauth Authentication. Is it safe..?

Now a days Internet is very comman in our day to day life . We even cannot think our life a second without Internet. Our life is surrounded by many websites and mobile applications . Some time you guys have seen some websites in which you have to login but you don't have account on that particular website so either you have to create that account by clicking Register or Signup button which takes longer process as after clicking you have to enter many details like your Name, Email, Mobile no. etc. and after that sometimes the sites will give you the verification code or link to click on it to verify.
             But its a long process you must have also seen an option of Login with Facebook or Google or with you Twitter account this , other way of logging into the websites with actually registering it is know as OAUTH AUTHENTICATION.

 Is OAUTH AUTHENTICATION safe..?

Now the question arises is it safe to Login with other account like Google or Facebook this might be possible that, the particular site for that you want access might steal you data from Facebook and Gmail account. 
              But here you are wrong.

These sites i.e Google and Facebook do not provides the details to that particular site like this .
As after clicking on Login with Facebook or Login with Google a page  is opened in your browser in with you have to login to your account if you are not logged it . And after that the site Facebook or Google tell you that the particular site for that you are going to logging in will take this much Information like Your Name , Email , or your Location etc.. if you agree with it then click ALLOW ACCESS if not then click deny.
               Now after that the particular site for which you are going to logging in will send an access code to Google and Facebook asking permission for details and showing access code as a proof as , that particular site is genuine.
             And after getting the access code Google or Facebook shares information with that particular site.
       So its safe to your OAUTH Authentication methods.
 
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/


Sunday, 28 January 2018

What are Trojan Horses. How to take Precautions with it.


Now a days it has become a trend of your mobile phones , computers are getting infected of some viruses, malwares, worms, or Trojan Horses you must have listen about it. Some people think that Trojans, viruses, malwares, worms are all same things. But its wrong then all are different.If you want to know the difference between them then click on the link below.

Different types of viruses and malwares.


History of Trojan 

The term Trojans are taken since the Ancient time as when Geeks were going on War in the Troy City the used to escape the soldiers in the horse and at night when the people or we can say the soldiers of opponent team sleep at night as they think horse as a comman object the gates of the horses are opened and the Geek soldiers start fighting. Similary, some attacks also happening now a days in our mobile phones and computers.

What is Trojan Horse.. ?


Trojan Horse is a malicious computer program that can infect you computer in several ways :- 
  •  In can slow down the processing of your computer.
  •  It might steal data in the form of cookies and may mis-use of that data.
  •  It can interrupt you in the forms of advertisements and popups.






You all must have seen these types of advertisements when you visit some malicious websites .
As there advertisements sometimes encourages you to click on them and in the backed  after clicking they start doing there process.  So beware with this and please do not click on any types of advertisements.

 Take Precautions with Trojans Horses 

The best precautions with these types of malware is only NOT TO CLICK on any these types of stuffs that it.

  •   As if you are professional you may know have to deal with it but for comman persons perspective it is a headache. 
  • On more thing you can do is you can install a registered antivirus to deal with it or if you can you should switch to Linux.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/




Thursday, 25 January 2018

Everything you must know about JARVIS Operating System


A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them.

Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis.
With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project.

Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions.
As for users in the IT Security field, it would help the users in information gathering, scanning, etc. Making an app for mobile by which you would be able to communicate with you're system remotely and give him tasks to do, ask questions, etc.

It all started with the release of Iron Man 3, after which Chiragh was determined to make Jarvis. Having no experience in Artificial Intelligence, he came home and started learning AI through online courses. The research work had started during which he came across a post by Himanshu stating that he too has been working on this project and would like people fro join him. After a detailed conversation and exchange of ideas, the project had started. During their course of development more people joined the project.
Project Task Completed: In the current version of Jarvis v1.0, it is capable of:

    Answering questions asked by the administrator
    Compile reports on any topic asked by the user.
    Control lights by voice.
    Basic interaction with the user.
    Handling Facebook, Email and Social profiles of users
    Using Twitter Account with voice control
    Basic OS kernel is ready.
    Can Scan targets for Hackers
    Gathering Basic information about the target

All the above functionalities are completely controlled by voice. It has only been four months since they have started this project and have achieved a lot in this short period of time.

The team will announce the OS publicly soon after completion of phase 3, but for now Chiragh proudly shows off his creation on the J.A.R.V.I.S project website.


So for more queries you can comment us below..
And you can also join us on Instagram and Facebook

Tuesday, 23 January 2018

Qubes OS. A Security Oriented Operating System.

What is Qubes OS ?

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.


Why Security of an Operating System is Important.? 

Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.

 Aren't Antivirus and Firewall enough .?

 Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it’s still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.

How Does Qubes OS provide you security ?

Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.
This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won’t affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.
Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Users concerned about privacy will appreciate the integration of Whonix with Qubes, which makes it easy to use Tor securely, while those concerned about physical hardware attacks will benefit from Anti Evil Maid.

How does Qubes OS compare to running VMs in a conventional OS?

Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.
By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.
Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.

How does Qubes OS compare to using a separate physical machine?

Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:
Pros
  • Physical separation doesn’t rely on a hypervisor. (It’s very unlikely that an attacker will break out of Qubes’ hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
  • Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)
Cons
  • Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
  • There’s generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
  • Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
  • Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.
So for more queries you can comment us below..
And you can also join us on Instagram and Facebook